Hybrid Blockchain-Enabled Security in Cloud Storage Infrastructure …

145

Non-repudiation: is the entity’s ability to assume responsibility for its actions on

its data set and not to refuse its procedures, so that the service level agreement

between the two parties is confirmed without any denial, and its consequences if

it does not apply, significant material losses, in addition to the loss of confidence

and reputation [21].

Authenticity: This means that the information in the cloud provider is original data

so that the owner and origin of the data can be ascertained, and this is accomplished

by numerous signature schemes [4].

Reliability: is the ability to deliver results consistently.

There are some other requirements for achieving security, such as: physical secu-

rity, data sanitization, non-collusion resistance, data segmentation, data traceability

and labeling, data location restrictions, backup procedures, authentication. Table 1

gives us the outline of cloud computing security issues.

2.6

Security in the SPI Model

As we mentioned, the cloud consists of three layers, which are SaaS, PaaS, and IaaS,

so each provider has its own infrastructure, platform, and software layer [23]. Thus,

when the customer deals with the applications provided by the cloud service provider,

he is forced to use the infrastructure and platform that that provider provides. Any

breach or attack in IaaS will necessarily affect the security of the other two layers

and vice versa, therefore, the cloud service provider has full access to customer data

and knowledge of their location [24], which determines the level of abstraction of

each layer and the extent of user control, so IaaS has greater control over the client,

and control is decreasing towards the upper layers, which increases the security risks

in them and vice versa.

Of course, each cloud service model has its own security weaknesses in addition

to the presence of common obstacles that have an impact on all of them [25], and this

increases the security dependency among them [6], we will talk about that below.

2.6.1

Software-as-a-Service (SaaS) Security Issues

As mentioned, SaaS provides application services such as email, conference

programs, and other applications [26]. The users of this layer have less control over

security than other layers, so the security concerns about this layer are rather large.

The geographical location of the customer information site is a concern, in addition to

that the information is processed and stored in this layer as normal text and therefore

must be encrypted to maintain its confidentiality [26], backup storage concerns [27],

in addition to that some cloud providers provide users with the ability to jointly access

data storage locations (Multiple Leasing Service), therefore CSP must separate any

user’s data from other unauthorized users. Sometimes a CSP causes a violation of